Original Article Text

Click to Toggle View

Hackers scanning for TeleMessage Signal clone flaw exposing passwords. Researchers are seeing exploitation attempts for the CVE-2025-48927 vulnerability in the TeleMessage SGNL app, which allows retrieving usernames, passwords, and other sensitive data. TeleMessage SGNL is a Signal clone app now owned by Smarsh, a compliance-focused company that provides cloud-based or on-premisses communication solutions to various organizations. Scanning for vulnerable endpoints Threat monitoring firm GreyNoise has observed multiple attempts to exploit CVE-2025-48927, likely by different threat actors. “As of July 16, GreyNoise has observed 11 IPs attempting to exploit CVE-2025-48927,” reports GreyNoise. “Related reconnaissance behavior is ongoing. Our telemetry shows active scanning for Spring Boot Actuator endpoints, a potential precursor to identifying systems affected by CVE-2025-48927.” According to GreyNoise, more than two thousand IPs have scanned for Sprint Boot Actuator endpoints over the past months, a little over 75% of them targeting the ‘/health’ endpoints specifically. The CVE-2025-48927 vulnerability is caused by exposing the ‘/heapdump’ endpoint from Spring Boot Actuator without authentication. TeleMessage addressed the issue but some on-prem installations are still vulnerable. When using outdated Spring Boot configurations that do not restrict access to diagnostic endpoints, the flaw lets an attacker download a full Java heap memory dump of approximately 150MB, which may contain plaintext usernames, passwords, tokens, and other sensitive data. To defend against these attacks, it is recommended to disable or restrict access to the /heapdump endpoint only to trusted IP ranges and limit the exposure of all Actuator endpoints as much as possible. Archiving Signal messages The TeleMessage SGNL app is designed to provide encrypted communication with built-in archival, so that all chats, calls, and attachments are automatically stored for compliance, auditing, or record-keeping. These claims have been disputed by past research saying that end-to-end encryption isn’t maintained and sensitive data, including messages, is stored in plaintext. This was exposed in May 2025, when a hacker accessed a diagnostic endpoint and downloaded credentials and archived content. The event triggered concerns about national security in the U.S., after revelations that the product was being used by the Customs & Border Protection and officials, including Mike Waltz. CVE-2025-48927 was disclosed in May and CISA added it to the Known Exploited Vulnerabilities (KEV) catalog on July 1, requesting that all federal agencies apply mitigations by July 22. The agency also listed CVE-2025-48928, a flaw in SGNL where a JSP app exposes a memory dump containing passwords sent over HTTP to unauthorized users. Cloud Detection & Response for Dummies Contain emerging threats in real time - before they impact your business. Learn how cloud detection and response (CDR) gives security teams the edge they need in this practical, no-nonsense guide.

Daily Brief Summary

CYBERCRIME // Hackers Target TeleMessage SGNL App Exposing User Data

Researchers have identified exploitation attempts aimed at a vulnerability (CVE-2025-48927) in the TeleMessage SGNL app, potentially compromising usernames, passwords, and other sensitive information.

GreyNoise, a threat monitoring firm, reported observing 11 IPs attempting to exploit this specific vulnerability, with ongoing related reconnaissance activities.

The flaw stems from unrestricted access to the '/heapdump' endpoint in Spring Boot Actuator, allowing unauthorized downloading of Java heap memory dumps that contain sensitive data.

Despite TeleMessage addressing the flaw, some on-prem installations remain at risk due to outdated configurations not limiting access to diagnostic endpoints.

To mitigate risk, it's recommended to disable or restrict access to sensitive endpoints, particularly the /heapdump endpoint, strictly to trusted IP addresses.

The SGNL app, although intended for secure communications with built-in archival for compliance, has faced scrutiny over claims of not maintaining end-to-end encryption, risking the integrity of stored messages and credentials.

This vulnerability and its exploitation highlighted national security concerns in the U.S, following its use by Customs & Border Protection and other officials.

CVE-2025-48927 has been added to the Known Exploited Vulnerabilities catalog by CISA, with a directive for federal agencies to apply necessary mitigations promptly.